In today’s world, the use of the internet has become extensive, with more people adopting the digital platform in their personal and business interactions. In fact, it is clear that very soon, digital users will find the world as a global village. Nonetheless, although the digital world promises a more globalized universe, the same arena has demonstrated some shortcomings where instead of people using technology appropriately, it is being used to perpetrate cybercrime. However, due to the increase in digital crime cases, vigilant approaches are now being used to hamper further destruction. Therefore, the response to people’s opinions on cyber crimes, examples of cases within various categories, an outline of which criminal approaches should be prioritized, and biblical insights into digital harassment are the main concerns raised for investigation.
In response to Chief McClelland’s opinion on cybercrime, it is palpable that from the onset, crime on the internet has not been prioritized. Considerably, both security agents and digital users slightly understand the concepts relating to cybercrime, where security representatives tackle them as old-school type of crime (Singleton, 2013). Moreover, misconduct on the internet becomes confusing as authorities do not understand that an individual can perpetrate crime without requiring an entire network. Besides, cybercrime does not require the presence of a criminal at a crime scene. On the other hand, security agents lack the knowledge that cybercrime can occur anywhere in the world. Therefore, criminals are not afraid of being punished by the authorities in the countries they are perpetuating their illegal activities (Singleton, 2013). On the other hand, cybercrime lacks priority because people do not recognize it because the evil happens on a more personalized level while old-school crimes occur in public where somebody can notice.
Cybercrime takes different dimensions. For instance, cyberstalking, threats and theft are some of the many crimes happening on the internet (Singleton, 2013). Cyber theft entails stealing through technology and perpetrating robbery on web-related activities such as embezzlement, unlawful appropriation, hacking, fraud, plagiarism, DNS cache poisoning, and piracy. For instance, several US companies in 2013 were embezzled close to 300 million dollars through hacking. In addition, five men from Ukraine and Russia hacked into Visa Inc., JetBlue Airways Corporation, NASDAQ, J.C. Penney Company, and Carrefour SA, where they stole and sold more than 160 credit cards to unsuspecting clients (Post, 2013). Cybervandalism is another major type of delinquency where criminals destroy and misuse resources. In most cases, the offenders ensure that a network either stops working or experiences disruption (Singleton, 2013). As a result, the system’s owner and other authorized users are denied the services they require. For example, in 2014, the Bitcoins Company experienced a distribution and denial of service (DDoS) attack while the cybercrime perpetrators had already managed to extort at least 26,000 US dollars from the firm (Ashford, 2015).
Cyberstalking is also one of many other types of criminal activities perpetrated through the internet. In this case, the digital platform is used to either stalk or harass individuals or groups. In fact, cyberstalking takes various forms, including solicitation for sex, defamation, libel, false accusations, and slander (Singleton, 2013). For instance, in 2013, James Allen from Michigan was tried with 18 counts of cyberstalking and the production of child pornography (FBI, 2013). According to the prosecutor, Allen used his cell phone to stalk 18 women in New York many of them being minors. Further, he used threats to solicit them for nude pictures and engage in a sex session with him through Skype.
While cyberstalking, threats and vandalism are a priority for all law enforcement agencies, it is critical that investigators look into digital terrorism and trespass. In essence, today’s world is facing the menace of terror attacks on a regular basis which are perpetrated and planned on the internet. Therefore, it is imperative for investigators to scrutinize the activities of cyber users as one way of eliminating terror activities globally (Singleton, 2013). In addition, cyber trespass should be explored in depth because despite the innocence attached to snooping on other people’s property, eventually, such perpetrators may resolve to disrupt, damage, and misuse sensitive data.
In St. Paul’s doctrine of Colossians, Jesus Christ is cited as the firstborn of the invisible God of all creation. Consequently, Jesus Christ, a human representative of God, reigns in authority over all human beings (New King James Version, Col 1:15-16). Moreover, Jesus sees everything and judges everyone due to his supernatural nature. Under those premises, Paul establishes that Jesus is the human agent of God, and every creation should follow his words because everything, including thrones and powers, has been created by his will. Therefore, on the internet, Jesus understands people’s actions and punishes sinners, including crime perpetrators. Moreover, Jesus paves the way for the human authorities to punish those who perpetrate crimes. In addition, Christ leads security agents to find ways of bringing criminals to trial because he is the prince of peace and loves a just world. Therefore, every human being is Christ’s priority, thus the need to both protect the innocent and punish the perpetrators.
In essence, the above discussion has averred that cybercrime is a real threat in today’s world. Agreeably, Chief McClelland’s opinion on the lack of priority to cybercrime is brought about by the lack of knowledge, resources, and time to combat digital criminals. In addition, it is evident that crime on the internet takes different approaches where theft, stalking, and vandalism are often perpetrated. Nonetheless, cyberterrorism and trespass should be prioritized because they are equally dangerous. Besides, the Bible establishes that Jesus, as the firstborn of God prioritizes protecting the innocent and punishing the wrongdoers. Therefore, Christ’s earthly representatives, including security agents, should help maintain order in society.
Ashford, W. (2015). Top 10 cyber crime stories of 2015. Computer Weekly. Retrieved from http://www.computerweekly.com/news/4500260419/Top-10-cyber-crime-stories-of-2015
FBI. (2013). Michigan man indicted on charges of cyberstalking and production of child pornography. The Department of Justice: Federal Bureau of Investigations. Retrieved from https://archives.fbi.gov/archives/buffalo/press-releases/2013/michigan-man-indicted-on-charges-of-cyberstalking-and-production-of-child-pornography
Post, A. (2013). Five hackers charged in biggest cyber crime case in U.S. history. Inside counsel Magazine. Retrieved from http://www.insidecounsel.com/2013/07/26/five-hackers-charged-in-biggest-cyber-crime-case-i
Singleton, T. (2013). The top 5 cybercrimes. American Institute of CPAs. 1-17.